Question
a.
PE & Resource Viewer
b.
Debugger
c.
Disassembler
d.
Hex Editor
Posted under Cyber Security
Engage with the Community - Add Your Comment
Confused About the Answer? Ask for Details Here.
Know the Explanation? Add it Here.
Q. PE & Resource Viewer permits programmers to inspect & alter resources which are entrenched in the EXE file of any software.
Similar Questions
Discover Related MCQs
Q. IDAPro is used as a _________________ in manual binary code analysis and also used a debugger.
View solution
Q. ________________ is a type of reverse engineering tool that is used to dissect binary codes into assembly codes.
View solution
Q. Which of the following is not a function or use of disassembler?
View solution
Q. Which of the following is not a feature of IDAPro?
View solution
Q. A _____________ takes executable file as input and tries to generate high level code.
View solution
Q. ________________ does not attempt to reverse the actions of compiler; rather it transforms the input program repeatedly until HLL code is achieved.
View solution
Q. _____________ will not recreate the original source file created by the compiler.
View solution
Q. Which of the following is not a decompiler tool?
View solution
Q. REC stands for ________________
View solution
Q. _______________ is a universal interactive program environment for reverse engineering.
View solution
Q. Which one is not an example of .Net application decompiler?
View solution
Q. __________ is a naming system given to different computers which adapt to human-readable domain names.
View solution
Q. DNS stands for _____________
View solution
Q. Some security issues might exist owing to misconfigured __________________ which can direct to disclosure of information regarding the domain.
View solution
Q. ______________ is a form of nasty online attack in which a user gets redirects queries to a DNS because of override of system’s TCP/IP settings.
View solution
Q. _____________ can be attained by the use of malware or by changing the server’s settings.
View solution
Q. There are _________ main types of DNS hijacking.
View solution
Q. DNS trojans are used for performing a type of DNS hijacking.
View solution
Q. The _______________ matches and maps to the user friendly domain name.
View solution
Q. Which of the following is not an example of DNS hijacking?
View solution
Suggested Topics
Are you eager to expand your knowledge beyond Cyber Security? We've curated a selection of related categories that you might find intriguing.
Click on the categories below to discover a wealth of MCQs and enrich your understanding of Computer Science. Happy exploring!